Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe
-
Size
175KB
-
MD5
c03f4e5a9e4c36c1a0d3c8a484b7fff0
-
SHA1
b870b638b87f1fd0ee962250aee8ea836108bcca
-
SHA256
fd99c3ebdc8a6c7f1f569454f32e61ba8893a28b2f9ea1936ced58d5f4e17c1c
-
SHA512
511cba299d56e9613cbe61affaae932f9d00842ca90fc5ae7ee853f9a88c44d5638c88bf1c938bdf04b48523b0d6954a30be7df6a82885b44bf2d4989cada728
-
SSDEEP
3072:KM9qOXo7oFDpDvypHj1B/N5ADbZKWswlp2EUP5:KM9qiO/NUdswlEEUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1860 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 1860 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1860 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1860 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1860 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe 28 PID 2256 wrote to memory of 1860 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe 28 PID 2256 wrote to memory of 1860 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe 28 PID 2256 wrote to memory of 1860 2256 c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c03f4e5a9e4c36c1a0d3c8a484b7fff0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:1860
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5701db1a6b5e17ec0f9a94783ba223f83
SHA108a8af4c108aea704d16cd4c3be4d978e61b8787
SHA2560f560f3867887417f1c3cc71fe8c621f2bf07c6b7a0a9dc9d78bfbad4e68b0c6
SHA512715592607672bcdc2d544412921d5ec2cae13cf67018191b1bf5cfd934090dca7b6f2737aec68a441cfb65ad7ba687ca0902ba98413fe634385fa650b2bc2130